Robert McArdle, Director FTR
· Our Contributors

Robert McArdle, Director FTR

Robert is a Director in Trend Micro‘s Forward Looking Threat Research team, where he is involved in analysing the latest Cybercrime threats, specializing in researching the future threat landscape, Open Source Intelligence (OSINT) and coordinating investigations with international law enforcement. Robert is a regular presenter for the press and at security conferences. He also lectures […]

Read more →
Security Threats and Risks in Smart Factories
· Cybersecurity

Security Threats and Risks in Smart Factories

Smart factories are manifestations of how the industrial internet of things (IIoT) is changing traditional manufacturing. Organizations in the manufacturing sector already have a basic understanding of what smart factories are as well as their capabilities and the advantages and challenges of building them. A pivotal change to adapt to technological advances like smart factories requires a huge […]

Read more →
Security Architecture for Smart Factories
· Cybersecurity

Security Architecture for Smart Factories

Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer. However, a realistic view of smart factories also involves acknowledging the risks and threats that may arise in its converged virtual and physical environment. As with many systems that integrate with the industrial internet of things […]

Read more →
Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities
· Cybersecurity

Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities

In our latest research paper, titled “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols” and written with Rainer Vosseler and Davide Quarta, we discussed how MQTT and CoAP are affected by design issues and implementation vulnerabilities that can allow attackers to subvert devices enabled by these two […]

Read more →
Morton Swimmer, Manager and Senior Threat Researcher
· Our Contributors

Morton Swimmer, Manager and Senior Threat Researcher

Morton Swimmer was born in New York City, USA, raised there and in Hamburg, Germany, then studied in England and Germany. It was at the University of Hamburg where he came to study computer security under Prof. Dr. Brunnstein and in 1988 he co-founded the Virus Test Center, the first academic research center for Malware. […]

Read more →
[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries
· Cybersecurity

[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries

TrendMicro published research at the end of October revealing how exposed human-machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be exploited, causing significant real-world impacts, such as contaminating the water supply. A vast majority of the identified exposed systems are from smaller energy and water organizations that […]

Read more →
US Cities Exposed: Industries and ICS security
· Cybersecurity

US Cities Exposed: Industries and ICS security

Today, 54% of the world’s population lives in urban areas, a proportion that is expected to increase to 66% by 2050. [2] According to the 2010 US Census, that number is even higher in the US, with 81% of the country’s population living in urban areas. [3] The largest metropolitan statistical areas in the US […]

Read more →
Smart Cities – Moving Toward Utopia with Security in Mind
· Smart Cities

Smart Cities – Moving Toward Utopia with Security in Mind

More than half (54%) of the world’s current population resides in urban areas compared with just 30% in the 1950s. In 2009, the global population was estimated at 6.8 billion —around 3.7 billion lived in urban areas. By 2050, 66% of all people will be urban dwellers. Urbanization does not always occur organically. To accelerate […]

Read more →
What you need to know about Cybersecurity when adopting IIoT solutions
· Cybersecurity

What you need to know about Cybersecurity when adopting IIoT solutions

According to  an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven into the fabric […]

Read more →
9 questions you should ask before choosing a security vendor
· Cybersecurity

9 questions you should ask before choosing a security vendor

There are many companies that provide security products and services for IT and OT environments. Needless to say, selecting the right vendor is key to the success of cybersecurity implementation across the organization. To help you make the ideal choice, here are some questions you might want to consider when evaluating the security vendor options […]

Read more →
Best Cybersecurity Practices for the IT/OT Environment
· Cybersecurity

Best Cybersecurity Practices for the IT/OT Environment

In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat […]

Read more →